Which document would be best created using Word Online?ANIMATIONGRAPHRESUMESPREADSHEET

Answers

Answer 1

Answer:

resume

Explanation:


Related Questions

What is a Word document? How do you use Word documents?

Answers

Answer:

Word document is a word processor developed by Microsoft in 1983.It is used for various purpose,some of this are Creating Document such as letters, brouchers, learning activities, pamphlets, books, newspaper, comics and many more such documents For sending multiple mails with personalized format with the help of mail merge a option in word Permanently storage of document

Hope this Helps :D

Please mark Brainliest :D

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

Answers

Network  Standards  help us to access a network, control  data transmission, and evaluate hardware devices across systems.

Networks standards  are built to direct the rules in data communications for the devises of hardware and  corresponding software  for prompt and efficient  interoperability between them.

Some official organizations responsible for regulating  standards are:

International Standards Organization (ISO) International Telecommunication Union (ITU) Institute of Electronics and Electrical Engineers (IEEE) American National Standards Institute (ANSI) Internet Research Task Force (IETF) Electronic Industries Association (EIA)

Different standards can be used during data communication at the same time on  different layers, Some  commonly used  ones includes:

Application layer − HTTP, HTML, POP, H.323, IMAP Transport layer − TCP, SPX

See more here:https://brainly.com/question/17316634

Programming that relies on the use of objects and methods to control complexity and solve problems is known as what type of programming

Answers

Answer:

Object-based programming

Explanation:

Another alternative more commonly used is Object Oriented Programming (OOP)

Can someone please help me with this .

Answers

Answer:

whether or not it is raining outside

if the first letter of your name starts with A

whether or not you were on time to school today

the answer to a yes or no question

whether or not it is monday

Explanation:

notice how all of them are "Whether" or "if" or "yes or no" or "1 or 0"

please help me will give brainliest

Answers

Answer:

The person may be a farmer market person or a marketer.

Looks like they are keeping track of how many of each item that they have sold or how many of each item they have.

_____ suites provide a collection of utility programs designed to alert users when certain kinds of viruses and worms enter their system.

Answers

Anti-virus software.........

Which of the following symbols comes first when a formula or function is written in a spreadsheet?()+=*

Answers

Answer:

Order of Evaluation in Computer:

()

Arithmetic Operators ( * / % + - ) IN THIS ORDER

Relational Operators (< ,<= , >,  >=,  ==,  !=)

NOT

AND

OR

Explanation:

So to answer the question. Here is the order in which they will be written

()

*

+

=

Python: Write a program that prompts the user for a meal: breakfast, lunch, or dinner. Then using if statements and else statements, print the user a message recommending a meal. For example, if the meal was breakfast, you could say something like, “How about some avocado on toast?”

Answers

The program prompts user for the time of meal they will be having and a suggestion made on their behalf. The program is written in python 3 thus :

meal= input('your meal : ')

#prompts user to enter a meal type

if meal == 'breakfast' :

#check if it's breakfast

print('How about some Avocado')

elif meal == 'lunch' :

#checks if it's lunch

print('like some grapes?')

else:

print('would rice be ok?')

A sample run of the program is attached.

Learn more :https://brainly.com/question/25531734

fast help me Behaving safely and ethically online involves _____.

agreeing to all online third-party agreements
agreeing to all online third-party agreements

always telling the truth about others, even negative things
always telling the truth about others, even negative things

educating yourself and others about cybersecurity
educating yourself and others about cybersecurity

always saying exactly what you think and feel

Answers

Based on online ethics and standard practice, behaving safely and ethically online involves "educating yourself and others about cybersecurity."

What is online ethics?

Online ethics is a contemporary term that is used to cover all the standard practices of online users which seek to protect private information, allow freedom of expression, prevent libel, etc.

Some of the Online Ethics

Private stays privateAvoid misquotingAvoid plagiarismProvide reference where possibleBe civil Never go overboard, etc.

Hence, in this case, it is concluded that the correct answer is "educating yourself and others about cybersecurity."

Learn more about online ethics here: https://brainly.com/question/8348173?section=similar

Answer:

educating yourself and others about cybersecurity

information taken from an existing classified source and generated

Answers

Explanation:

Derivative classification )-

It is the process of using existing classified information

to create new documents or material, and marking the newly-developed document or

material consistent with the classification markings that apply to the source information.

Copying or duplicating existing classified information, such as photocopying a document, is

not derivative classification.

Which tab can be used to change the theme and background style of a presentation?

Answers

Answer:

Design IS the correct answer

Explanation:

Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again

Answers

What Zelda who has been a victim of cybersecurity attacks do so as to avoid the occurrence in future is to : configure all her gadgets so they can download as well as install security updates automatically.

cybersecurity attacks can be regarded as cyber crime where the information of people are used to commit crime.

So for Zelda not be a victim again she need to configure her gadget so security update can be done automatically so as to avoid the occurrence.

Learn  more

https://brainly.com/question/24189453?referrer=searchResults

Database performance is one of the least important factors in all database implementations. Group of answer choices True False

Answers

False
Hope this helps

What is the easiest way to get great answers?

Answers

If you listen to the teachers in class and take notes, then your answers should be some of the best! My advice is to take notes and pay close attention. If you sit by friends in class that make you talk during the lesson, then ask the teacher to move desks. Hope this helps!!!

Sorry i have Another Question

Why is it important to be able to manage large amounts of data?

A- So it can be deleted when needed.
B- So it can be easily examined and analyzed.
C- So it can be exported quickly.
D So it can be cut and pasted into separate worksheets.

Answers

Answer:

the answer would be (B)

Explanation:

Right on EDGE 21' Computer and Technology

hope that helps :D ! have a good day.

Answer:

b

Explanation:

dbuherbbhvbhjcbhjbhjdhbbchcdhchdchc

Step 4: Write your GDD THE GAME IS ABOUT FLAPPY BIRD
Now that we’ve brainstormed a bit, set up a Game Design Document with the following headers, then complete each section. It may be helpful to complete this Activity at the same time as you are reading through the Unit.

Title
Description
Purpose
Audience
Genre
Gameplay Narrative
Gameplay Style
Player State
Character Descriptions
Objectives, Operation, Obstacles, Outcome
Game Mechanics
Game Interface
A Game Design Document is called a “living document” because it gets updated as you go along in the game design process. So, think about what you write as a draft. As you continue into the second part of the course, you might find that you want to adjust your ideas and goals for your game, and this is totally okay! Writing it down now allows you to do some good goal-setting and get all your ideas out into one place that you can refer to later.
100 POINTS AND BRAINEST FOR FIRST ANSWER
Submit your brainstorming work and your Game Design Document.

Answers

IAnswer:

I am not sure

Explanation:

i think game mechanics

Answer: it might be game mechanics

Explanation: im not sure

Information systems degree programs typically fall into the computer, business, or _____ category. Question 4 options: a) management b) technology c) media d) social

Answers

Answer:

management

Explanation:

What happens if you try to open a file for writing, but the file or device is writeprotected (sometimes called read-only)

Answers

Answer:

If it is for read-only, an exception is thrown.

Explanation:

Question:
Which file type uses equations instead of pixels to create the image?

A.PDF
B.GIF
C.TIFF
D.EPS

Answers

Answer:

The file type that uses equations instead of pixels are D.EPS or vector files

Explanation:

A(n) _______ is a set of colors that complement each other and are designed to work well in a presentation.

Answers

Answer: color theme

Explanation:

how have computer affected education​

Answers

Answer:

It encourage students to procrastinate, and reduces the efficiency of the time they spend in class. Regarding students' belief in their aptitude to multitask

Let's assume there are 500 items in a sorted list. In the worst case, about how many checks would Binary Search make to find a target value

Answers

Answer:

500?

Explanation:

I'm assuming the search will either check from the beginning or the end. If the the item is the 499 and the search starts at 0 than it will do 500 checks right? Same way if the item is at index 0 and the search starts from the 499.

A technician is working on a laptop and GPS is not functioning. What is a possible solution for this situation

Answers

A possible solution to a laptop whose global positioning system (GPS) is not functioning is to: verify that airplane mode is not activated on the laptop.

A laptop can be defined as a small, portable computer that is embedded with a keyboard and monitor, which is light enough in terms of weight, to be placed on the user's lap while working.

Assuming, the technician has verified that all the wireless settings on the laptop are correct.

Hence, the most likely problem for the laptop's global positioning system (GPS) not to function is that it is in airplane mode.

Generally, when an airplane mode is activated (turned on) on a laptop, all the software programs that uses wireless technology would not function, until it is disabled (turned off)

In conclusion, a possible solution to a laptop whose global positioning system (GPS) is not functioning is to verify that airplane mode is not activated (turned on) on the laptop.

Read more: https://brainly.com/question/20347476

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each documen

Answers

Answer:

Sysprint.sep

What are two potential benefits of using calendar-synchronization tools like calendly

A. If team members want to look up cultural holidays, they can search for them and compare the dates
B. If team members want to share documents with other team members, they can automatically share the documents on specific dates
C. If team members live in another time zone, their meeting times are automatically converted to display the correct time on their devices.
D. If team members prefer to schedule meetings at different times of the day, times can be discussed and arranged to accommodate everyone.

Answers

The answer is B, sorry if I’m wrong

100 POINTS!!!!!!
In RSA encryption, the pubic key is ______.

A. generated by the server

B. two prime numbers

C. known only by the server

D. known only by the user's computer

Answers

Answer:

Explanation:

it would be C. sent to the user's computer from the server

now if its private its A.  known only by the server

this is on edg i hate this class, these answers i got right

Its known only by the server. Thus the option C is correct.

What is the RSA encryption?

The RSA is the Rivest and Shamir and Adlemana encryption format where the message is sent with a code called as public key and is shared openly.

The encryption is an algorithm and is decrypted with a another key called as  the private key.

The algorithm is used for the encryption of the messages and was forest developed in 1977.

Find out more information about the RSA encryption.

brainly.com/question/17486027.

A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Answers

Answer:

A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3.

A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

It should be noted that a computer security risk is an action that could cause damage to software or hardware.

A computer security risk can result from unpatched software, misconfigured hardware, software and bad habits.

Read related link on:

https://brainly.com/question/21507976

What is the second argument in the header of a for loop?


A. Initialization

B. Equalization

C. Boolean expression

D. Update statement

Answers

Answer:

if im correct i think it would be B

Explanation:

In the previous activity the learner developed an idea for a game, this included the game plot, storyline, characters, interaction, and so on. In this activity, the learner should adapt the game concept and create a game to run on a mobile platform. Create a game for smartphones featuring the characters you created in the previous activity. You may visit video game websites and research online to find out how creating games for smartphones differs from creating games for other platforms. Specify for which mobile operating system you will create the game and give reasons for your choice. Your response should include the following points:
NEED HELP ASAP! Game development question.
State the basic game concept, the game genre, and game rules and objectives.
Explain how you will adapt the game for the smartphone: include descriptions of the smartphone’s features and restrictions and how they will enhance or hamper the playing experience.
Describe the pros and cons of developing games for various mobile platforms, including your choice of platform.

Answers

Answer:

I hope this helps, this is my first time doing an answer in Brainly.

Explanation:

The game concept will be this, your character, being a green lizard, will jump from platform to platform. Constantly scrolling up with the character, but if you fall behind, it's game over.

If I know anything about smartphones is the the screens are usually tiny, and are very hard to play on. So I will impliment motion controls. If you tilt the screen in the direction you want the lizard to go, it will follow that tilt.

The pros is that it's a lot more easy when developing the game, the cons is that the games are usually super small.

What are the differences and similarities between computer virus and biological virus

Answers

Explanation:

computer virus is a virus that affects a computer a biological virus is a virus that can infect a living this sorry if I am wrong

Other Questions
Help help help please please please >_ plz help asap plzzzzzzz Let f(x) = 87.Which function represents a transformation of f () by a vertical stretch with factor 2?O g(x) = 822O g() = 852o g(x) = 1.81O g(x)=2.82 recuerdos de Vietnam.-. >. A mutagenic process that alters the chromosome segment by repeating one or more segments is referred to asGroup of answer choicesdeletion.duplication.crossing over.substitution. What is (x+3)(x-3) in standard form ? Can someone please explain step by step to get marked brainliest! At which values of x does the function F(x) have a vertical asymptote? Check all that apply. could u help plz dis hw dont make sense Pens cost 20p each and pencils cost 12p each.If I buy 6 pens and 5 pencils what will be the total cost? The United States was founded on dreams people had of shaping the society in which they lived. What were some of those dreams? Three cars (car F, car G, and car H) are moving with the same velocity, and slam on the brakes. The most massive car is car F, and the least massive is car H. Assuming all three cars have identical tires, which car travels the longest distance to skid to a stop what type of muscle cells are arranged in sheets or layers with adjacent muscle cells electrically connected by gab junction Name 5 apps that can help you use your cell phone to its fullest potential. In the first paragraph, the author focuses on advertising in digital media. How does that focus change in paragraph 2? According to the author, why is this information important? How do people learn the meanings of idioms?by looking up each word in a dictionaryby memorizing their wordingby visualizing exactly what they sayby hearing them used over and over Marking as brainliest! Hey guys can you guys please help me ASAP??I HAVE A TIMERRR..TYSM PLEASE HELP!!!!!!!!!!!!!!HELP What the tabbasum say about the children from the village?